Behavioral task
behavioral1
Sample
45d3f12af25783b8b5787f19138e05bb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45d3f12af25783b8b5787f19138e05bb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
45d3f12af25783b8b5787f19138e05bb_JaffaCakes118
-
Size
354KB
-
MD5
45d3f12af25783b8b5787f19138e05bb
-
SHA1
092c7c32ab76e22518af4ed6aa15b2cfdacc841a
-
SHA256
07e1a29dd16f4d6de29fc6f348ee47d61e136d6a3a9534711b8c74bb4fa77dd6
-
SHA512
06df6c4b9a1588bac6a93398e9e675da9c69b61982be290027e9348c05ad54d2e9b277806db422e76a8dcac0d9708298a91f008eebbba861bbcad0d1bb53d9a9
-
SSDEEP
6144:cstFj0WnmBHW4PUiFm9zy1zUIdC7+jBSHSV95h1rK56vylm7ge3mL9g7qq:puWmE4ciFmMzUVlibh1rK56kIbk9g7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 45d3f12af25783b8b5787f19138e05bb_JaffaCakes118 unpack001/out.upx
Files
-
45d3f12af25783b8b5787f19138e05bb_JaffaCakes118.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 353KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 327KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE